Method and system for securing communication
First Claim
1. A method for generating at least one secret for use by a plurality of members, comprising:
- sending, by a first member, a first request for connection with a second member;
sending, by the first member, a second request for connection with a third member;
receiving, by the first member from the second member, a second input after the first request is sent and after communication is initiated between the first member and the second member;
receiving, by the first member from the third member, a third input after the second request is sent and after communication is initiated between the first member and the third member;
generating, using an n-bit generator executing on the first member, a message digest using a first input, the second input, and the third input, wherein the first input is not obtained from the second member and the first input is not obtained from the third member;
extracting a secret from the message digest;
storing the secret in a secrets repository on the first member; and
generating, by the first member using the n-bit generator and the secret, a second message digest; and
encrypting communication between at least the first member and the second member using at least a portion of the second message digest, including extracting, by the first member, an encryption solution from the second message digest, wherein the encryption solution comprises an encryption key and algorithm selector bits.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for generating one or more secrets for use by members. The method includes sending a first request for connection with a second member, and sending a second request to connection with a third member. The method further includes receiving, by the first member from the second member, a second input after the first request is sent and after communication is initiated between the first member and the second member and receiving, by the first member from the third member, a third input after the second request is sent and after communication is initiated between the first member and the third member. The method further includes generating, using an n-bit generator executing on the first member, a message digest using a first input, the second input, and the third input, extracting a secret from the message digest, and storing the secret in a secrets repository on the first member.
-
Citations
21 Claims
-
1. A method for generating at least one secret for use by a plurality of members, comprising:
-
sending, by a first member, a first request for connection with a second member; sending, by the first member, a second request for connection with a third member; receiving, by the first member from the second member, a second input after the first request is sent and after communication is initiated between the first member and the second member; receiving, by the first member from the third member, a third input after the second request is sent and after communication is initiated between the first member and the third member; generating, using an n-bit generator executing on the first member, a message digest using a first input, the second input, and the third input, wherein the first input is not obtained from the second member and the first input is not obtained from the third member; extracting a secret from the message digest; storing the secret in a secrets repository on the first member; and generating, by the first member using the n-bit generator and the secret, a second message digest; and encrypting communication between at least the first member and the second member using at least a portion of the second message digest, including extracting, by the first member, an encryption solution from the second message digest, wherein the encryption solution comprises an encryption key and algorithm selector bits. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for generating at least one secret for use by a plurality of members, comprising:
-
receiving, by a first member, a request to contact a second member; initiating, in response to the request, communication between the first member and the second member; receiving, by the first member from the second member, a second input after communication is initiated between the first member and the second member; generating, using an n-bit generator executing on the first member, a message digest using at least a first input and the second input, wherein the first input is not obtained from the second member; extracting a secret from the message digest; storing the secret in a secrets repository on the first member; and generating, by the first member using the n-bit generator and the secret, a second message digest; and encrypting communication between at least the first member and the second member using at least a portion of the second message digest, including extracting, by the first member, an encryption solution from the second message digest, wherein the encryption solution comprises an encryption key and algorithm selector bits. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A non-transitory computer readable medium comprising instructions, which when executed by a processor perform a method, the method comprising:
-
sending, by a first member, a first request for connection with a second member; sending, by the first member, a second request to connection with a third member; receiving, by the first member from the second member, a second input after the first request is sent and after communication is initiated between the first member and the second member; receiving, by the first member from the third member, a third input after the second request is sent and after communication is initiated between the first member and the third member; generating, using an n-bit generator executing on the first member, a message digest using a first input, the second input, and the third input, wherein the first input is not obtained from the second member and the first input is not obtained from the third member; extracting a secret from the message digest; storing the secret in a secrets repository on the first member; generating, by the first member using the n-bit generator and the secret, a second message digest; encrypting communication between at least the first member and the second member using at least a portion of the second message digest; and encrypting communication between at least the first member and the third member using at least a portion of the second message digest, including extracting, by the first member, an encryption solution from the second message digest, wherein the encryption solution comprises an encryption key and algorithm selector bits.
-
-
21. A non-transitory computer readable medium comprising instructions, which when executed by a processor perform a method, the method comprising:
-
receiving, by a first member, a request to contact a second member; initiating, in response to the request, communication between the first member and the second member; receiving, by the first member from the second member, a second input after communication is initiated between the first member and the second member; generating, using an n-bit generator executing on the first member, a message digest using at least a first input and the second input, wherein the first input is not obtained from the second member; extracting a secret from the message digest; storing the secret in a secrets repository on the first member; generating, by the first member using the n-bit generator and the secret, a second message digest; encrypting communication between at least the first member and the second member using at least a portion of the second message digest; and encrypting communication between at least the first member and the third member using at least a portion of the second message digest, including extracting, by the first member, an encryption solution from the second message digest, wherein the encryption solution comprises an encryption key and algorithm selector bits.
-
Specification